It is portable and does not require an Internet connection to function. What InSpectre does is check for any Spectre and Meltdown patches on your system and then provides you with the potential impact on performance. Additionally, it will allow admins the option to disable the respective protections if needed - keep in mind, using this to enable or disable those protections will modify the Registry keys.

Within the main window, InSpectre provides you with detailed data regarding the checks that it made and also provides you with a decent amount of general vulnerability information about each of the vulnerabilities. You are given information that pertains specifically to whether your OS or hardware need updating to protect against attacks that may attempt to exploit the weaknesses that Spectre or Meltdown pose. The impact rating is unique among some of the other similar tools but knowing if it is an accurate assessment is yet to be seen. But still a neat function for performance concerned users.

Version History for InSpectre:
Users of an earlier version of Windows 10 (version 1703 ‑ the non-Fall Creator's Update) reported that InSpectre did not believe that their system had been patched for the Spectre vulnerability. Upon analysis, a bug was discovered in that version of Windows which affected the way 32-bit applications, such as InSpectre, viewed the system. This was apparently fixed in the later “Fall Creator's Update” (version 1709) but not in the earlier version. A 64-bit “probe” was added to the 6th release of InSpectre to work around this bug in version 1703 so that InSpectre would accurately reflect any system's true protection.

And, while we were at it, the language presented in the summary was changed from “vulnerable” to “protected” so that “YES” was the good answer and “NO!” was the bad answer. :)

Like it? Love it? Leave a comment below. Please note that comments requesting support or pointing out listing errors will be deleted. Visit our Support Forums for help or drop an email to mgnews @ majorgeeks.com to report mistakes. Thank you!